Results 191 to 200 of about 52,803 (214)
Some of the next articles are maybe not open access.

Cyber Attacks

Computers & Security, 2012
openaire   +1 more source

MODELLING CYBER ATTACKS

In this article, we present a model of cyber attacks which can be used to represent a cyber attack in an intuitive and concise way. With ever-increasing popularities of online services, we have seen a growing number of cyber attacks targeted towards large online service providers as well as individuals and the IoT devices.
openaire   +1 more source

Detection of Cyber-Attacks

2016
Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours.
openaire   +1 more source

New forms of cyber Attacks

SSRN Electronic Journal, 2023
Philippe Jougleux   +2 more
openaire   +1 more source

Current Cyber Attack Methods

2006
Understand that cyber attacks are not random but instead are executed with deliberate intent and specific purpose. Ö Identify many of the internal penetration approaches to achieve security breaches. Ö Discover the most common external penetration tactics directed against systems. Ö Come to realize the part that people play in the breach of systems.
openaire   +1 more source

Cyber attacks: awareness

Network Security, 2011
openaire   +1 more source

Targeted Cyber-attacks

Network Security, 2014
openaire   +2 more sources

Worldwide cyber-attacks

Network Security, 2002
openaire   +1 more source

Home - About - Disclaimer - Privacy